Haben, G., Habchi, S., Papadakis, M., Cordy, M., & Le Traon, Y. (2021). A Replication Study on the Usability of Code Vocabulary in Predicting Flaky Tests. 18th International Conference on Mining Software Repositories.
Peer reviewed
Abstract—Industrial reports indicate that flaky tests are one of the primary concerns of software testing mainly due to the false signals they provide. To deal with this issue, researchers have developed tools ...
Samhi, J., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2021). RAICC: Revealing Atypical Inter-Component Communication in Android Apps. In J., Samhi, A., Bartel, T. F. D. A., Bissyande, & J., Klein, 43rd International Conference on Software Engineering (ICSE).
Peer reviewed
Inter-Component Communication (ICC) is a key mechanism in Android. It enables developers to compose rich functionalities and explore reuse within and across apps. Unfortunately, as reported by a large body of ...
Ma, W., Thierry Titcheu, C., Papadakis, M., & Harman, M. (2021). MuDelta: Delta-Oriented Mutation Testing at Commit Time. International Conference on Software Engineering (ICSE).
Peer reviewed
Mouline, L., Cordy, M., & Le Traon, Y. (2020). Load approximation for uncertain topologies in the low-voltage grid. INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS, 11-13 November 2020 (pp. 1-6).
Peer reviewed
Smart grids allow operators to monitor the grid continuously, detect occurring incidents, and trigger corrective actions. To perform that, they require a deep understanding of the effective situation within ...
Basile, D., Ter Beek, M., Cordy, M., & Legay, A. (2020). Tackling the equivalent mutant problem in real-time systems: the 12 commandments of model-based mutation testing. SOFTWARE PRODUCT LINE CONFERENCE.
Peer reviewed
Ghamizi, S., Rwemalika, R., Cordy, M., Veiber, L., Bissyande, T. F. D. A., Papadakis, M., Klein, J., & Le Traon, Y. (2020). Data-driven simulation and optimization for covid-19 exit strategies. In S., Ghamizi, R., Rwemalika, M., Cordy, L., Veiber, T. F. D. A., Bissyande, M., Papadakis, J., Klein, & Y., Le Traon, Data-driven simulation and optimization for covid-19 exit strategies (pp. 3434-3442). New York, NY, USA: Association for Computing Machinery.
Peer reviewed
The rapid spread of the Coronavirus SARS-2 is a major challenge that led almost all governments worldwide to take drastic measures to respond to the tragedy. Chief among those measures is the massive lockdown ...
Liu, K., Wang, S., Koyuncu, A., Kim, K., Bissyande, T. F. D. A., Kim, D., Wu, P., Klein, J., Mao, X., & Le Traon, Y. (2020). On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. 42nd ACM/IEEE International Conference on Software Engineering (ICSE).
Peer reviewed
Test-based automated program repair has been a prolific field of research in software engineering in the last decade. Many approaches have indeed been proposed, which leverage test suites as a weak, but ...
Cordy, M., Papadakis, M., & Legay, A. (2020). Statistical Model Checking for Variability-Intensive Systems. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, Dublin 22-25 April 2020.
Peer reviewed
Kolbe, N., Vandenbussche, P.-Y., Kubler, S., & Le Traon, Y. (2020). LOVBench: Ontology Ranking Benchmark. Proceedings of The Web Conference 2020 (WWW '20).
Peer reviewed
Antoniadis, N., Cordy, M., Sifaleras, A., & Le Traon, Y. (2020). Preventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach. Communications in Computer and Information Science (pp. 269-281). Springer, Cham.
Peer reviewed
Cable overloading is one of the most critical disturbances that may occur in smart grids, as it can cause damage to the distribution power lines. Therefore, the circuits are protected by fuses so that, the ...
Ghamizi, S., Cordy, M., Gubri, M., Papadakis, M., Boystov, A., Le Traon, Y., & Goujon, A. (2020). Search-based adversarial testing and improvement of constrained credit scoring systems. ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '20), November 8-13, 2020.
Peer reviewed
Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2020). Adversarial Embedding: A robust and elusive Steganography and Watermarking technique. Paper presented at IEEE Symposium on Security and Privacy.
Peer reviewed
We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image classification ...
Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2020). FeatureNET: Diversity-driven Generation of Deep Learning Models. International Conference on Software Engineering (ICSE).
Peer reviewed
Ma, W., Laurent, T., Ojdanić, M., Titcheu Chekam, T., Ventresque, A., & Papadakis, M. (2020). Commit-Aware Mutation Testing. IEEE International Conference on Software Maintenance and Evolution (ICSME).
Peer reviewed
Sun, Z., Zhang, J., Harman, M., Papadakis, M., & Zhang, L. (2020). Automatic Testing and Improvement of Machine Translation. International Conference on Software Engineering (ICSE).
Peer reviewed
Tian, H., Liu, K., Kaboreé, A. K., Koyuncu, A., Li, L., Klein, J., & Bissyandé, T. F. (2020). Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. In H., Tian, 35th IEEE/ACM International Conference on Automated Software Engineering, September 21-25, 2020, Melbourne, Australia.
Peer reviewed
A large body of the literature of automated program repair develops approaches where patches are generated to be validated against an oracle (e.g., a test suite). Because such an oracle can be imperfect, the ...
Titcheu Chekam, T., Papadakis, M., & Le Traon, Y. (2020). Muteria: An Extensible and Flexible Multi-Criteria Software Testing Framework. ACM/IEEE International Conference on Automation of Software Test (AST) 2020.
Peer reviewed
Program based test adequacy criteria (TAC), such as statement, branch coverage and mutation give objectives for software testing. Many techniques and tools have been developed to improve each phase of the TAC ...
Rwemalika, R., Kintis, M., Papadakis, M., Le Traon, Y., & Lorrach, P. (2019). An industrial study on the differences between pre-release and post-release bugs. Proceedings of 35th IEEE International Conference on Software Maintenance and Evolution (pp. 11). IEEE.
Peer reviewed
Software bugs constitute a frequent and common issue of software development. To deal with this problem, modern software development methodologies introduce dedicated quality assurance procedures. At the same ...
Cordy, M., & Lazreg, S. (2019). Automated evaluation of embedded-system design alternatives. Proceedings of the 23rd International Systems and Software Product Line Conference, SPLC 2019, Volume A, Paris, France, September 9-13, 2019 (pp. 52:1).
Peer reviewed
Patout, P.-A., & Cordy, M. (2019). Towards context-aware automated writing evaluation systems. Proceedings of the 1st ACM SIGSOFT International Workshop on Education through Advanced Software Engineering and Artificial Intelligence, EASEAI@ESEC/SIGSOFT FSE 2019, Tallinn, Estonia, August 26, 2019 (pp. 17-20).
Peer reviewed
Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Monperrus, M., Klein, J., & Le Traon, Y. (2019). iFixR: bug report driven program repair. ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering.
Peer reviewed
Issue tracking systems are commonly used in modern software development for collecting feedback from users and developers. An ultimate automation target of software maintenance is then the systematization of ...
Liu, K., Koyuncu, A., Kim, D., & Bissyande, T. F. D. A. (2019). TBar: Revisiting Template-based Automated Program Repair. 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA).
Peer reviewed
We revisit the performance of template-based APR to build com-prehensive knowledge about the effectiveness of fix patterns, andto highlight the importance of complementary steps such as faultlocalization or ...
Cordy, M., Legay, A., Lazreg, S., & Collet, P. (2019). Towards sampling and simulation-based analysis of featured weighted automata. Proceedings of the 7th International Workshop on Formal Methods in Software Engineering (pp. 61-64).
Peer reviewed
Lazreg, S., Cordy, M., Collet, P., Heymans, P., & Mosser, S. (2019). Multifaceted automated analyses for variability-intensive embedded systems. Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (pp. 854-865).
Peer reviewed
Liu, K., Kim, D., Bissyande, T. F. D. A., Kim, T., Kim, K., Koyuncu, A., Kim, S., & Le Traon, Y. (2019). Learning to Spot and Refactor Inconsistent Method Names. 41st ACM/IEEE International Conference on Software Engineering (ICSE). Montreal, Canada: IEEE.
Peer reviewed
To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations. Debugging ...
Liu, K., Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., & Le Traon, Y. (2019). You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019). Xi'an, China: IEEE.
Peer reviewed
Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure that it ...
Liu, K., Koyuncu, A., Dongsun, K., & Bissyande, T. F. D. A. (2019). AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations. The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER-2019). Hangzhou, China: IEEE.
Peer reviewed
Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained with ...
Amand, B., Cordy, M., Heymans, P., Acher, M., Temple, P., & Jézéquel, J.-M. (2019). Towards Learning-Aided Configuration in 3D Printing: Feasibility Study and Application to Defect Prediction. Proceedings of the 13th International Workshop on Variability Modelling of Software-Intensive Systems, VAMOS 2019, Leuven, Belgium, February 06-08, 2019 (pp. 7:1-7:9).
Peer reviewed
Polge, J., Robert, J., & Le Traon, Y. (2019). Assessing the impact of attacks on OPC-UA applications in the Industry 4.0 era. 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019.
Peer reviewed
Benedick, P.-L., Robert, J., & Le Traon, Y. (2019). TRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0. Proceedings of 45th Annual Conference of the IEEE Industrial Electronics Society.
Peer reviewed
Cordy, M., Devroey, X., Legay, A., Perrouin, G., Classen, A., Heymans, P., Schobbens, P.-Y., & Raskin, J.-F. (2019). A Decade of Featured Transition Systems. From Software Engineering to Formal Methods and Tools, and Back - Essays Dedicated to Stefania Gnesi on the Occasion of Her 65th Birthday (pp. 285-312).
Peer reviewed
Cordy, M., Muller, S., Papadakis, M., & Le Traon, Y. (2019). Search-based Test and Improvement of Machine-Learning-Based Anomaly Detection Systems. ACM SIGSOFT International Symposium on Software Testing and Analysis.
Peer reviewed
Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2019). Automated Search for Configurations of Deep Neural Network Architectures. Automated Search for Configurations of Convolutional Neural Network Architectures.
Peer reviewed
Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as configurable ...
Gorski III, S. A., Andow, B., Nadkarni, A., Manandhar, S., Enck, W., Bodden, E., & Bartel, A. (2019). ACMiner: Extraction and Analysis of Authorization Checks inAndroid’s Middleware. ACM.
Peer reviewed
Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android’s permission model is well studied, the enforcementof ...
Javed, A., Yousefnezhad, N., Robert, J., Heljanko, K., & Främling, K. (2019). Access Time Improvement Framework for Standardized IoT Gateways. Proceedings of IEEE International Conference on Pervasive Computing and Communications.
Peer reviewed
Jimenez, M., Rwemalika, R., Papadakis, M., Sarro, F., Le Traon, Y., & Harman, M. (2019). An Empirical Study on Vulnerability Prediction of Open-Source Software Releases. Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE).
Peer reviewed
Jimenez, M., Rwemalika, R., Papadakis, M., Sarro, F., Le Traon, Y., & Harman, M. (2019). The Importance of Accounting for Real-World Labelling When Predicting Software Vulnerabilities. Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE).
Peer reviewed
Kolbe, N., Kubler, S., & Le Traon, Y. (2019). Popularity-driven Ontology Ranking using Qualitative Features. The Semantic Web - ISWC 2019.
Peer reviewed
Efficient ontology reuse is a key factor in the Semantic Web to enable and enhance the interoperability of computing systems. One important aspect of ontology reuse is concerned with ranking most relevant ...
Leong, C., Abhayendra, S., Papadakis, M., Le Traon, Y., & Micco, J. (2019). Assessing Transition-based Test Selection Algorithms at Google. International Conference on Software Engineering (ICSE).
Peer reviewed
Molina, F., Degiovanni, R. G., Ponzio, P., Regis, G., Aguirre, N., & Frias, M. F. (2019). Training binary classifiers as data structure invariants. Proceedings of the 41st International Conference on Software Engineering ICSE 2019, Montreal, QC, Canada, May 25-31, 2019 (pp. 759 - 770).
Peer reviewed
We present a technique that enables us to distinguish valid from invalid data structure objects. The technique is based on building an artificial neural network, more precisely a binary classifier, and ...
Padhye, R., Lemieux, C., Sen, K., Papadakis, M., & Le Traon, Y. (2019). Semantic Fuzzing with Zest. ACM SIGSOFT International Symposium on Software Testing and Analysis.
Peer reviewed
Plazar, Q., Acher, M., Perrouin, G., Devroey, X., & Cordy, M. (2019). Uniform Sampling of SAT Solutions for Configurable Systems: Are We There Yet? 12th IEEE Conference on Software Testing, Validation and Verification, ICST 2019, Xi'an, China, April 22-27, 2019 (pp. 240-251).
Peer reviewed
Rwemalika, R., Kintis, M., Papadakis, M., Le Traon, Y., & Lorrach, P. (2019). On the Evolution of Keyword-Driven Test Suites. 12th IEEE International Conference on Software Testing, Verification and Validation.
Peer reviewed
Many companies rely on software testing to verify that their software products meet their requirements. However, test quality and, in particular, the quality of end-to-end testing is relatively hard to achieve ...
Schmitt, X., Kubler, S., Robert, J., Papadakis, M., & Le Traon, Y. (2019). A Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate. International Conference on Social Networks Analysis, Management and Security.
Peer reviewed
Titcheu Chekam, T., Papadakis, M., & Le Traon, Y. (2019). Mart: A Mutant Generation Tool for LLVM. In T., Titcheu Chekam, M., Papadakis, & Y., Le Traon, Mart: A Mutant Generation Tool for LLVM.
Peer reviewed
Program mutation makes small syntactic alterations to programs' code in order to artificially create faulty programs (mutants). Mutants are used, in software analysis, to evaluate and improve test suites ...
Rwemalika, R., Kintis, M., Papadakis, M., & Le Traon, Y. (2018, December 11). Can we automate away the main challenges of end-to-end testing? Paper presented at The 17th Belgium-Netherlands Software Evolution Workshop, Delft, Netherlands.
Peer reviewed
Agile methodologies enable companies to drastically increase software release pace and reduce time-to-market. In a rapidly changing environment, testing becomes a cornerstone of the software development ...
Liu, K., Koyuncu, A., Kim, K., Kim, D., & Bissyande, T. F. D. A. (2018). LSRepair: Live Search of Fix Ingredients for Automated Program Repair. 25th Asia-Pacific Software Engineering Conference (APSEC).
Peer reviewed
Automated program repair (APR) has extensively been developed by leveraging search-based techniques, in which fix ingredients are explored and identified in different granularities from a specific search space ...
Ghatpande, S., Groszschädl, J., & Liu, Z. (2018). A Family of Lightweight Twisted Edwards Curves for the Internet of Things. In O., Blazy & C. Y., Yeun (Eds.), Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Proceedings (pp. 193-206). Springer Verlag.
Peer reviewed
We introduce a set of four twisted Edwards curves that satisfy common security requirements and allow for fast implementations of scalar multiplication on 8, 16, and 32-bit processors. Our curves are defined ...
Jimenez, M., Titcheu Chekam, T., Cordy, M., Papadakis, M., Kintis, M., Le Traon, Y., & Harman, M. (2018, October 11). Are mutants really natural? A study on how “naturalness” helps mutant selection. Proceedings of 12th International Symposium on 
 Empirical Software Engineering and Measurement (ESEM'18).
Peer reviewed
Background: Code is repetitive and predictable in a way that is similar to the natural language. This means that code is ``natural'' and this ``naturalness'' can be captured by natural language modelling ...
Jimenez, M., Cordy, M., Le Traon, Y., & Papadakis, M. (2018). TUNA: TUning Naturalness-based Analysis. 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018.
Peer reviewed
Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have shown ...
Jimenez, M., Cordy, M., Le Traon, Y., & Papadakis, M. (2018, September). On the impact of tokenizer and parameters on N-gram based Code Analysis. Paper presented at 34th IEEE International Conference on Software Maintenance and Evolution (ICSME'18), Madrid, Spain.
Peer reviewed
Recent research shows that language models, such as n-gram models, are useful at a wide variety of software engineering tasks, e.g., code completion, bug identification, code summarisation, etc. However, such ...
Liu, K., Kim, D., Koyuncu, A., Li, L., Bissyande, T. F. D. A., & Le Traon, Y. (2018). A Closer Look at Real-World Patches. 34th IEEE International Conference on Software Maintenance and Evolution (ICSME).
Peer reviewed
Bug fixing is a time-consuming and tedious task. To reduce the manual efforts in bug fixing, researchers have presented automated approaches to software repair. Unfortunately, recent studies have shown that ...
Mouline, L., Benelallam, A., Fouquet, F., Bourcier, J., & Barais, O. (2018). A Temporal Model for Interactive Diagnosis of Adaptive Systems. In L., Mouline, A., Benelallam, F., Fouquet, J., Bourcier, & O., Barais, 2018 IEEE International Conference on Autonomic Computing (ICAC).
Peer reviewed
The evolving complexity of adaptive systems impairs our ability to deliver anomaly-free solutions. Fixing these systems require a deep understanding on the reasons behind decisions which led to faulty or ...
Benedick, P.-L., Robert, J., Le Traon, Y., & Kubler, S. (2018). O-MI/O-DF vs. MQTT: a performance analysis. O-MI/O-DF vs. MQTT: a performance analysis.
Peer reviewed
Over the past decade, a flourishing number of concepts and architectural shifts appeared such as Industrial Internet of Things (IIoT), Industrial CPS or even Industry 4.0. Unfortunately, today’s IoT as well as ...
Kim, K., Kim, D., Bissyande, T. F. D. A., Choi, E., Li, L., Klein, J., & Le Traon, Y. (2018). FaCoY - A Code-to-Code Search Engine. International Conference on Software Engineering (ICSE 2018).
Peer reviewed
Code search is an unavoidable activity in software development. Various approaches and techniques have been explored in the literature to support code search tasks. Most of these approaches focus on serving ...
Marcozzi, M., Bardin, S., Kosmatov, N., Papadakis, M., Prevosto, V., & Correnson, L. (2018). Time to Clean Your Test Objectives. 40th International Conference on Software Engineering, May 27 - 3 June 2018, Gothenburg, Sweden.
Peer reviewed
Martinez, J., Sottet, J.-S., Garcia-Frey, A., Bissyande, T. F. D. A., Ziadi, T., Klein, J., Temple, P., Mathieu, A., & Le Traon, Y. (2018). Towards Estimating and Predicting User Perception on Software Product Variants. 17th International Conference on Software Reuse (ICSR) (pp. 23-40). Springer, LNCS.
Peer reviewed
Fouquet, F., Hartmann, T., Mosser, S., & Cordy, M. (2018). Enabling lock-free concurrent workers over temporal graphs composed of multiple time-series. 33rd Annual ACM Symposium on Applied Computing (SAC'18).
Peer reviewed
Time series are commonly used to store temporal data, e.g., sensor measurements. However, when it comes to complex analytics and learning tasks, these measurements have to be combined with structural context ...
Li, D., Lin, J., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification. 21st International Conference on Extending Database Technology.
Peer reviewed
This paper presents a multiscale visibility graph representation for time series as well as feature extraction methods for time series classification (TSC). Unlike traditional TSC approaches that seek to find ...
Delavernhe, F., Saber, T., Papadakis, M., & Ventresque, A. (2018). A Hybrid Algorithm for Multi-objective Test Case Selection in Regression Testing. IEEE CONGRESS ON EVOLUTIONARY COMPUTATION.
Peer reviewed
Jimenez, M., Le Traon, Y., & Papadakis, M. (2018). Enabling the Continous Analysis of Security Vulnerabilities with VulData7. IEEE International Working Conference on Source Code Analysis and Manipulation.
Peer reviewed
Papadakis, M., Shin, D., Yoo, S., & Bae, D.-H. (2018). Are Mutation Scores Correlated with Real Fault Detection? A Large Scale Empirical study on the Relationship Between Mutants and Real Faults. 40th International Conference on Software Engineering, May 27 - 3 June 2018, Gothenburg, Sweden.
Peer reviewed
Papadakis, M., Titcheu Chekam, T., & Le Traon, Y. (2018). Mutant Quality Indicators. 13th International Workshop on Mutation Analysis (MUTATION'18).
Peer reviewed
Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., & Le Traon, Y. (2018). Predicting the Fault Revelation Utility of Mutants. 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018.
Peer reviewed
Hefnawy, A., Elhariri, T., Bouras, A., Cherifi, C., Robert, J., Kubler, S., & Frӓmling, K. (2017). Combined Use of Lifecycle Management and IoT in Smart Cities. Combined Use of Lifecycle Management and IoT in Smart Cities.
Peer reviewed
Kolbe, N., Robert, J., Kubler, S., & Le Traon, Y. (2017). PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem. Proceedings of the 14th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.
Peer reviewed
The Internet of Things (IoT) is promising to open up opportunities for businesses to offer new services to uncover untapped needs. However, before taking advantage of such opportunities, there are still ...
Benelallam, A., Hartmann, T., Mouline, L., Fouquet, F., Bourcier, J., Barais, O., & Le Traon, Y. (2017). Raising Time Awareness in Model-Driven Engineering. 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (pp. 181-188). Springer.
Peer reviewed
The conviction that big data analytics is a key for the success of modern businesses is growing deeper, and the mobilisation of companies into adopting it becomes increasingly important. Big data integration ...
Kubler, S., Derigent, W., Voisin, A., Robert, J., & Le Traon, Y. (2017). Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices. Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices.
Peer reviewed
Abstract—Fuzzy AHP is today one of the most used Multiple Criteria Decision-Making (MCDM) techniques. The main argument to introduce fuzzy set theory within AHP lies in its ability to handle uncertainty and ...
Hartmann, T., Fouquet, F., Jimenez, M., Rouvoy, R., & Le Traon, Y. (2017). Analyzing Complex Data in Motion at Scale with Temporal Graphs. Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering.
Peer reviewed
Modern analytics solutions succeed to understand and predict phenomenons in a large diversity of software systems, from social networks to Internet-of-Things platforms. This success challenges analytics ...
Kolbe, N., Kubler, S., Robert, J., Le Traon, Y., & Zaslavsky, A. (2017). Towards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle Services. 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings.
Peer reviewed
A present challenge in today’s Internet of Things (IoT) ecosystem is to enable interoperability across hetero- geneous systems and service providers. Restricted access to data sources and services limits the ...
Kolbe, N., Zaslavsky, A., Kubler, S., Robert, J., & Le Traon, Y. (2017). Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components. Modeling and Using Context.
Peer reviewed
Theimportanceofsystem-levelcontext-andsituationaware- ness increases with the growth of the Internet of Things (IoT). This paper proposes an integrated approach to situation awareness by providing a ...
Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (2017, July). Impact of Tool Support in Patch Construction. Paper presented at 2017 International Symposium on Software Testing & Analysis (ISSTA).
Peer reviewed
In this work, we investigate the practice of patch construction in the Linux kernel development, focusing on the differences between three patching processes: (1) patches crafted entirely manually to fix bugs ...
Titcheu Chekam, T., Papadakis, M., Le Traon, Y., & Harman, M. (2017). An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption. International Conference on Software Engineering (ICSE 2017).
Peer reviewed
Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage and ...
Hurier, M., Suarez-Tangil, G., Dash, S. K., Bissyande, T. F. D. A., Le Traon, Y., Klein, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. MSR 2017.
Peer reviewed
Android malware is now pervasive and evolving rapidly. Thousands of malware samples are discovered every day with new models of attacks. The growth of these threats has come hand in hand with the proliferation ...
Li, L., Bissyande, T. F. D. A., Bartel, A., Klein, J., & Le Traon, Y. (2017, May). The Multi-Generation Repackaging Hypothesis. Poster session presented at The 39th International Conference on Software Engineering.
Peer reviewed
App repackaging is a common threat in the Android ecosystem. To face this threat, the literature now includes a large body of work proposing approaches for identifying repackaged apps. Unfortunately, although ...
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017, May). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017).
Peer reviewed
To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to ...
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017, May). Understanding Android App Piggybacking. Poster session presented at The 39th International Conference on Software Engineering.
Peer reviewed
The Android packaging model offers adequate opportunities for attackers to inject malicious code into popular benign apps, attempting to develop new malicious apps that can then be easily spread to a large ...
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. The 32nd ACM Symposium on Applied Computing (SAC 2017).
Peer reviewed
As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more ...
Mouline, L., Hartmann, T., Fouquet, F., Le Traon, Y., Bourcier, J., & Barais, O. (2017). Weaving Rules into Models@run.time for Embedded Smart Systems. In L., Mouline, T., Hartmann, F., Fouquet, Y., Le Traon, J., Bourcier, & O., Barais, Programming '17 Companion to the first International Conference on the Art, Science and Engineering of Programming. Brussels, Belgium: ACM.
Peer reviewed
Smart systems are characterised by their ability to analyse measured data in live and to react to changes according to expert rules. Therefore, such systems exploit appropriate data models together with ...
Devroey, X., Perrouin, G., Papadakis, M., Legay, A., Schobbens, P.-Y., & Heymans, P. (2017). Automata Language Equivalence vs. Simulations for Model-based Mutant Equivalence: An Empirical Evaluation. 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017).
Peer reviewed
Laurent, T., Papadakis, M., Kintis, M., Henard, C., Le Traon, Y., & Ventresque, A. (2017). Assessing and Improving the Mutation Testing Practice of PIT. 10th IEEE International Conference on Software Testing, Verification and Validation.
Peer reviewed
Loise, T., Devroey, X., Perrouin, G., Papadakis, M., & Heymans, P. (2017). Towards Security-aware Mutation Testing. The 12th International Workshop on Mutation Analysis (Mutation 2017).
Peer reviewed
Kubler, S., Robert, J., Hefnawy, A., Cherifi, C., Bouras, A., & Främling, K. (2016). IoT-based Smart Parking System for Sporting Event Management. Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 104-114). New York, USA: ACM New York.
Peer reviewed
By connecting devices, people, vehicles and infrastructures everywhere in a city, governments and their partners can improve community wellbeing and other economic and financial aspects (e.g., cost and energy ...
Jimenez, M., Papadakis, M., & Le Traon, Y. (2016). An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel. 2016 Asia-Pacific Software Engineering Conference (APSEC).
Peer reviewed
Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify many ...
Jimenez, M., Papadakis, M., & Le Traon, Y. (2016). Vulnerability Prediction Models: A case study on the Linux Kernel. 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016.
Peer reviewed
To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at making a ...
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. The 15th International Symposium on Intelligent Data Analysis.
Peer reviewed
The abundance of time series data in various domains and their high dimensionality characteristic are challenging for harvesting useful information from them. To tackle storage and processing challenges ...
Li, L., Bissyande, T. F. D. A., Le Traon, Y., & Klein, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12).
Peer reviewed
As Android becomes a de-facto choice of development platform for mobile apps, developers extensively leverage its accompanying Software Development Kit to quickly build their apps. This SDK comes with a set of ...
Kolbe, N., Zaslavsky, A., Kubler, S., & Robert, J. (2016). Reasoning over Knowledge-based Generation of Situations in Context Spaces to Reduce Food Waste. Reasoning over Knowledge-based Generation of Situations in Context Spaces to Reduce Food Waste (NEW2AN/ruSMART 2016, LNCS 9870 proceedings). Nungambakkam, India: Springer.
Peer reviewed
Abstract. Situation awareness is a key feature of pervasive computing and requires external knowledge to interpret data. Ontology-based reasoning approaches allow for the reuse of predefined knowledge, but do ...
Manukyan, A., Olivares Mendez, M. A., Bissyande, T. F. D. A., Voos, H., & Le Traon, Y. (2016, September 06). UAV degradation identification for pilot notification using machine learning techniques. Proceedings of 21st IEEE International Conference on Emerging Technologies and Factory Automation ETFA 2016.
Peer reviewed
Unmanned Aerial Vehicles are currently investigated as an important sub-domain of robotics, a fast growing and truly multidisciplinary research field. UAVs are increasingly deployed in real-world settings for ...
Jimenez, M., Papadakis, M., Bissyande, T. F. D. A., & Klein, J. (2016). Profiling Android Vulnerabilities. 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS 2016) (pp. 222-229). IEEE Computer Society.
Peer reviewed
In widely used mobile operating systems a single vulnerability can threaten the security and privacy of billions of users. Therefore, identifying vulnerabilities and fortifying software systems requires ...
Hefnawy, A., Elhariri, T., Bouras, A., Cherifi, C., Robert, J., Kubler, S., & Främling, K. (2016). Lifecycle Management in the Smart City Context: Smart Parking Use-Case. 13th IFIP International Conference on Product Lifecycle Management, Columbia SC 10-13 July 2016 (Springer book Advanced ICT series). Springer.
Peer reviewed
Lifecycle management enables enterprises to manage their products, services and product-service bundles. IoT and CPS have made products and services smarter by closing the loop of data across different phases ...
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016).
Peer reviewed
Time series mining has become essential for extracting knowledge from the abundant data that flows out from many application domains. To overcome storage and processing challenges in time series mining ...
Li, D., Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. 12th International Conference on Machine Learning and Data Mining (MLDM 2016).
Peer reviewed
Time series data are abundant in various domains and are often characterized as large in size and high in dimensionality, leading to storage and processing challenges. Symbolic representation of time series – ...
Kubler, S., Buda, A., Robert, J., & Främling, K. (2016). Building Lifecycle Management System for Enhanced Closed Loop Collaboration. 13th IFIP International Conference on Product Lifecycle Management (PLM16) (Springer book Advanced ICT series). Springer.
Peer reviewed
In the past few years, the architecture, engineering and construction (AEC) industry has carried out efforts to develop BIM (Building Information Modelling) facilitating tools and standards for enhanced ...
Kubler, S., Robert, J., Le Traon, Y., Umbrich, J., & Neumaier, S. (2016). Open Data Portal Quality Comparison using AHP. Proceedings of the 17th International Digital Government Research Conference on Digital Government Research (pp. 397-407). New York, USA: ACM.
Peer reviewed
During recent years, more and more Open Data becomes available and used as part of the Open Data movement. However, there are reported issues with the quality of the metadata in data portals and the data ...
Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA: ACM.
Peer reviewed
We present a growing collection of Android Applications collected from several sources, including the official Google Play app market. Our dataset, AndroZoo, currently contains more than three million apps ...
Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Klein, J., & Le Traon, Y. (2016). Near Real-Time Electric Load Approximation in Low Voltage Cables of Smart Grids with Models@run.time. 31st Annual ACM Symposium on Applied Computing (SAC'16) (pp. 2119--2126).
Peer reviewed
Micro-generations and future grid usages, such as charging of electric cars, raises major challenges to monitor the electric load in low-voltage cables. Due to the highly interconnected nature, real-time ...
Li, L., Li, D., Bartel, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016).
Peer reviewed
Despite much effort in the community, the momentum of Android research has not yet produced complete tools to perform thorough analysis on Android apps, leaving users vulnerable to malicious apps. Because it ...
Titcheu Chekam, T., Ennan, Z., Zhenhua, L., Yong, C., & Kui, R. (2016). On the Synchronization Bottleneck of OpenStack Swift-like Cloud Storage Systems. IEEE International Conference on Computer Communications, San Francisco, CA 10-15 April 2016 (pp. 9). IEEE Xplore®.
Peer reviewed
As one type of the most popular cloud storage services, OpenStack Swift and its follow-up systems replicate each data object across multiple storage nodes and leverage object sync protocols to achieve high ...
Li, D., Bissyande, T. F. D. A., Kubler, S., Klein, J., & Le Traon, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. The 2016 IEEE International Conference on Industrial Technology (ICIT 2016).
Peer reviewed
Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). An Investigation into the Use of Common Libraries in Android Apps. The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 12).
Peer reviewed
The packaging model of Android apps requires the entire code necessary for the execution of an app to be shipped into one single apk file. Thus, an analysis of Android apps often visits code which is not part ...
Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps. The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 5).
Peer reviewed
Parameter values are important elements for un- derstanding how Application Programming Interfaces (APIs) are used in practice. In the context of Android, a few number of API methods are used pervasively by ...
Tricoire, M., Barais, O., Leduc, M., Bourcier, J., Fouquet, F., Nain, G., Mouline, L., Sunyé, G., & Morin, B. (2016). KevoreeJS: Enabling dynamic software reconfigurations in the Browser. WICSA/CompArch 2016 Proceedings.
Peer reviewed
Octeau, D., Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., & Le Traon, Y. (2016). Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis. The 43rd Symposium on Principles of Programming Languages (POPL 2016).
Peer reviewed
Static analysis has been successfully used in many areas, from verifying mission-critical software to malware detection. Unfortunately, static analysis often produces false positives, which require significant ...
Coles, H., Laurent, T., Henard, C., Papadakis, M., & Ventresque, A. (2016). PIT a Practical Mutation Testing Tool for Java. International Symposium on Software Testing and Analysis, ISSTA 2016.
Peer reviewed
Devroey, X., Perrouin, G., Papadakis, M., Legay, A., Schobbens, P.-Y., & Heymans, P. (2016). Featured model-based mutation analysis. 38th International Conference on Software Engineering (ICSE'16).
Peer reviewed
Henard, C., Papadakis, M., Harman, M., Jia, Y., & Le Traon, Y. (2016). Comparing White-box and Black-box Test Prioritization. 38th International Conference on Software Engineering (ICSE'16).
Peer reviewed
Although white-box regression test prioritization has been well-studied, the more recently introduced black-box prioritization approaches have neither been compared against each other nor against more well ...
Huang, W., Ma, W., Viti, F., & Tampere, C. (2016). An Optimization-Based Iterative Learning Method for Anticipatory Network Traffic Control. Proceedings of the 16th COTA International Conference of Transportation Professionals.
Peer reviewed
Hurier, M., Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (pp. 142--162). Springer.
Peer reviewed
There is generally a lack of consensus in Antivirus (AV) engines' decisions on a given sample. This challenges the building of authoritative ground-truth datasets. Instead, researchers and practitioners may ...
Kintis, M., Papadakis, M., Papadopoulos, A., Valvis, E., & Malevris, N. (2016). Analysing and Comparing the Effectiveness of Mutation Testing Tools: A Manual Study. International Working Conference on Source Code Analysis and Manipulation (SCAM'16).
Peer reviewed
Li, L., Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Mining Families of Android Applications for Extractive SPL Adoption. The 20th International Systems and Software Product Line Conference (SPLC 2016).
Peer reviewed
The myriads of smart phones around the globe gave rise to a vast proliferation of mobile applications. These applications target an increasing number of user profiles and tasks. In this context, Android is a ...
Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Name Suggestions during Feature Identification: The VariClouds Approach. 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings.
Peer reviewed
Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Feature Location Benchmark for Software Families using Eclipse Community Releases. Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings.
Peer reviewed
Meira, J. A., Almeira, E. C. D., Kim, D., Filho, E. R. L., & Le Traon, Y. (2016). “Overloaded!” — A Model-based Approach to Database Stress Testing. International Conference on Database and Expert Systems Applications, Porto 5-8 September 2016.
Peer reviewed
Muller, S., Harpes, C., Le Traon, Y., Gombault, S., Bonnin, J.-M., & Hoffmann, P. (2016). Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures. International Conference on Critical Information Infrastructures Security (pp. 163-175). Springer International Publishing.
Peer reviewed
Critical Infrastructures are known for their complexity and the strong interdependencies between the various components. As a result, cascading effects can have devastating consequences, while foreseeing the ...
Papadakis, M., Henard, C., Harman, M., Jia, & Le Traon, Y. (2016). Threats to the validity of mutation-based test assessment. International Symposium on Software Testing and Analysis, ISSTA 2016.
Peer reviewed
Robert, J., Kubler, S., & Le Traon, Y. (2016). Micro-billing framework for IoT: Research & Technological foundations. International Conference on Future Internet of Things and Cloud, 22-24 August 2016, Vienna, Austria.
Peer reviewed
In traditional product companies, creating value meant identifying enduring customer needs and manufacturing well-engineered solutions. Two hundred and fifty years after the start of the Industrial Revolution ...
Robert, J., Kubler, S., Le Traon, Y., & Främling, K. (2016). O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis. O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis.
Peer reviewed
The Industrial Internet should provide means to create ad hoc and loosely coupled information flows between objects, users, services, and business domain systems. However, today’s technologies and products ...
Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Mouelhi, T., Klein, J., & Le Traon, Y. (2015). Suspicious Electric Consumption Detection Based on Multi-Profiling Using Live Machine Learning. 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
Peer reviewed
The transition from today’s electricity grid to the so-called smart grid relies heavily on the usage of modern information and communication technology to enable advanced features like two-way communication ...
Nguyen, P. H., Yskout, K., Heyman, T., Klein, J., Scandariato, R., & Le Traon, Y. (2015). SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems. Proceedings ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems.
Peer reviewed
Model-Driven Security (MDS) for secure systems development still has limitations to be more applicable in practice. A recent systematic review of MDS shows that current MDS approaches have not dealt with ...
Bartolini, C., El Kateb, D., Le Traon, Y., & Hagen, D. (2015). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? Economics of Grids, Clouds, Systems, and Services. Springer.
Peer reviewed
A major part of the commercial Internet is moving towards a cloud paradigm. This phenomenon has a drastic impact on the organizational structures of enterprises and introduces new challenges that must be ...
Hartmann, T., Moawad, A., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Stream my Models: Reactive Peer-to-Peer Distributed Models@run.time. In T., Lethbridge, J., Cabot, & A., Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 80-89). Passau, Germany: Conference Publishing Consulting.
Peer reviewed
The models@run.time paradigm promotes the use of models during the execution of cyber-physical systems to represent their context and to reason about their runtime behaviour. However, current modeling ...
Moawad, A., Hartmann, T., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Beyond Discrete Modeling: A Continuous and Efficient Model for IoT. In T., Lethbridge, J., Cabot, & A., Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 90-99). Passau, Germany: Conference Publishing Consulting.
Peer reviewed
Internet of Things applications analyze our past habits through sensor measures to anticipate future trends. To yield accurate predictions, intelligent systems not only rely on single numerical values, but ...
Li, L., Allix, K., Li, D., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2015). Potential Component Leaks in Android Apps: An Investigation into a new Feature Set for Malware Detection. The 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS 2015).
Peer reviewed
Li, L., Bartel, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. International Conference on ICT Systems Security and Privacy Protection (SEC 2015).
Peer reviewed
Henard, C., Papadakis, M., & Le Traon, Y. (2015). Flattening or not of the combinatorial interaction testing models. Eighth IEEE International Conference on Software Testing, Verification and Validation, ICST 2015 Workshops (pp. 1-4). IEEE.
Peer reviewed
Moawad, A., Hartmann, T., Fouquet, F., Klein, J., & Le Traon, Y. (2015). Adaptive Blurring of Sensor Data to balance Privacy and Utility for Ubiquitous Services. The 30th Annual ACM Symposium on Applied Computing (pp. 2271-2278). ACM.
Peer reviewed
Given the trend towards mobile computing, the next generation of ubiquitous “smart” services will have to continuously analyze surrounding sensor data. More than ever, such services will rely on data ...
Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015, March). Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps. Paper presented at Grande Region Security and Reliability Day 2015.
Peer reviewed
Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (pp. 51-67). Springer International Publishing.
Peer reviewed
In this paper, we consider the relevance of timeline in the construction of datasets, to highlight its impact on the performance of a machine learning-based malware detection scheme. Typically, we show that ...
Bardin, S., Delahaye, M., Kosmatov, N., David, R., Papadakis, M., Le Traon, Y., & Marion, J.-Y. (2015). Sound and Quasi-Complete Detection of Infeasible Test Requirements. 8th IEEE International Conference on Software Testing, Verification and Validation (ICST'15).
Peer reviewed
El Kateb, D., Elrakaiby, Y., Mouelhi, T., Rubab, I., & Le Traon, Y. (2015). Towards a full support of obligations in XACML. Lecture Notes in Computer Science, 8924, 213-221.
Peer reviewed
Policy-based systems rely on the separation of concerns, by implementing independently a software system and its associated security policy. XACML (eXtensible Access Control Markup Language) proposes a ...
Henard, C., Papadakis, M., Harman, M., & Le Traon, Y. (2015). Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. 37th International Conference on Software Engineering (ICSE 2015).
Peer reviewed
Li, L., Bartel, A., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015).
Peer reviewed
Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. At installation, this application is given permission to (1) access the Internet (for updating wallpapers ...
Martinez, J., Rossi, G., Ziadi, T., Bissyandé, T. F. D. A., Klein, J., & Traon, Y. L. (2015). Estimating and Predicting Average Likability on Computer-Generated Artwork Variants. Genetic and Evolutionary Computation Conference, GECCO 2015, Madrid Spain, July 11-15, 2015, Companion Material Proceedings (pp. 1431--1432). ACM.
Peer reviewed
Martinez, J., Ziadi, T., Bissyandé, T. F., Klein, J., & Traon, Y. L. (2015). Bottom-up adoption of software product lines: a generic and extensible approach. Proceedings of the 19th International Conference on Software Product Line, SPLC 2015, Nashville, TN, USA, July 20-24, 2015 (pp. 101--110).
Peer reviewed
Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Automating the Extraction of Model-based Software Product Lines from Model Variants. 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015).
Peer reviewed
Papadakis, M., Yue, J., Harman, M., & Le Traon, Y. (2015). Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique. 37th International Conference on Software Engineering (ICSE 2015).
Peer reviewed
Ko, D., Ma, K., Park, S., Kim, S., Kim, D., & Le Traon, Y. (2014, December 01). API Document Quality for Resolving Deprecated APIs. Paper presented at The 21st Asia-Pacific Software Engineering Conference.
Peer reviewed
Hartmann, T., Fouquet, F., Klein, J., Le Traon, Y., Pelov, A., Toutain, L., & Ropitault, T. (2014). Generating Realistic Smart Grid Communication Topologies Based on Real-Data. 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
Peer reviewed
Today’s electricity grid must undergo substantial changes in order to keep pace with the rising demand for energy. The vision of the smart grid aims to increase the efficiency and reliability of today’s ...
El Kateb, D., Fouquet, F., bourcier, J., & Le Traon, Y. (2014, October). Optimizing Multi-Objective Evolutionary Algorithms to Enable Quality-Aware Software Provisioning. Paper presented at The 14th International Conference on Quality Software.
Li, L., Bartel, A., Klein, J., & Le Traon, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), IEEE, Sept. 2014, Beijing, China.
Peer reviewed
We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform data-flow analysis on Android applications to find potential component leaks that could potentially be ...
Nguyen, P. H., Klein, J., & Le Traon, Y. (2014). Model-Driven Security with A System of Aspect-Oriented Security Design Patterns. 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling.
Peer reviewed
Model-Driven Security (MDS) has emerged for more than a decade, as a specialization of Model-Driven Engineering (MDE), to propose sound MD methodologies for supporting secure systems development. Yet, there is ...
Hartmann, T., Fouquet, F., Nain, G., Brice, M., Klein, J., & Le Traon, Y. (2014, July 02). Model-based time-distorted Contexts for efficient temporal Reasoning. Poster session presented at 26th International Conference on Software Engineering and Knowledge Engineering, Vancouver, Canada.
Peer reviewed
Intelligent systems continuously analyze their context to autonomously take corrective actions. Building a proper knowledge representation of the context is the key to take adequate actions. This requires ...
Allix, K., Jerome, Q., Bissyande, T. F. D. A., Klein, J., State, R., & Le Traon, Y. (2014). A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected? Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (pp. 384--393). Washington, DC, USA: IEEE Computer Society.
Peer reviewed
We consider in this paper the analysis of a large set of malware and benign applications from the Android ecosystem. Although a large body of research work has dealt with Android malware over the last years ...
Hartmann, T., Fouquet, F., Nain, G., Morin, B., Klein, J., & Le Traon, Y. (2014). Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach. Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (1st, pp. 586-591). Vancouver, Canada: Knowledge Systems Institute Graduate School, USA.
Peer reviewed
Intelligent systems continuously analyze their context to autonomously take corrective actions. Building a proper knowledge representation of the context is the key to take adequate actions. This requires ...
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., & McDaniel, P. (2014, June). FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. Paper presented at ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI 2014).
Peer reviewed
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by carelessly programmed apps that leak important data by accident, and by malicious ...
Hartmann, T., Fouquet, F., Klein, J., Nain, G., & Le Traon, Y. (2014). Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning. Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14).
Peer reviewed
Smart grids leverage modern information and communication technology to offer new perspectives to electricity consumers, producers, and distributors. However, these new possibilities also increase the ...
Li, L., Bartel, A., Klein, J., & Le Traon, Y. (2014, March 12). Using A Path Matching Algorithm to Detect Inter-Component Leaks in Android Apps. Paper presented at Grande Region Security and Reliability Day 2014.
Peer reviewed
Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality. Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 163--166). New York, NY, USA: ACM.
Peer reviewed
To address the issue of malware detection, researchers have recently started to investigate the capabilities of machine- learning techniques for proposing effective approaches. Sev- eral promising results ...
El Kateb, D., Fouquet, F., Nain, G., Meira, J. A., Ackerman, M., & Le Traon, Y. (2014, March). Generic Cloud Platform Multi-objective Optimization Leveraging Models@run.time. Paper presented at 29th Symposium On Applied Computing.
Peer reviewed
Li, L., Bartel, A., Klein, J., & Le Traon, Y. (2014, February 26). Detecting privacy leaks in Android Apps. Paper presented at International Symposium on Engineering Secure Software and Systems - Doctoral Symposium.
Peer reviewed
The number of Android apps have grown explosively in recent years and the number of apps leaking private data have also grown. It is necessary to make sure all the apps are not leaking private data before ...
Nguyen, P. H., Klein, J., & Le Traon, Y. (2014). Modeling, composing, and testing of security concerns in a Model-Driven Security approach. In W., Joosen, F., Martinelli, & T., Heyman (Eds.), Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014).
Peer reviewed
Model-Driven Security (MDS) has emerged as a promising sound methodology for supporting the development of secure systems nowadays. Following the advances in MDS, this research work aims at 1) developing new ...
Abgrall, E., Le Traon, Y., Gombault, S., & Monperrus, M. (2014). Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: an Urgent Need for Systematic Security Regression Testing. 7th IEEE International Conference on Software Testing, Verification and Validation (ICST)- Workshop SECTEST (pp. 34-41). New York: Ieee.
Peer reviewed
One of the major threats against web applications is Cross-Site Scripting (XSS). The final target of XSS attacks is the client running a particular web browser. During this last decade, several competing web ...
Bertolino, A., Le Traon, Y., Lonetti, F., Marchetti, E., & Mouelhi, T. (2014). Coverage-based Test Cases Selection for XACML Policies. IEEE International Conference on Software Testing Verification and Validation Workshops, 12-21.
Peer reviewed
XACML is the de facto standard for implementing access control policies. Testing the correctness of policies is a critical task. The test of XACML policies involves running requests and checking manually the ...
Carlos, F., Papadakis, M., Durelli, V., & Delamaro, E. M. (2014). Test Data Generation Techniques for Mutation Testing: A Systematic Mapping. Workshop on Experimental Software Engineering (ESELAW'14).
Peer reviewed
Devroey, X., Perrouin, G., Cordy, M., Papadakis, M., Legay, A., & Schobbens, P.-Y. (2014). A Variability Perspective of Mutation Analysis. Proceedings of the 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2014).
Peer reviewed
El Kateb, D., Elrakaiby, Y., Mouelhi, T., Rubab, I., & Le Traon, Y. (2014). Towards a Full Support of Obligations In XACML. Paper presented at 9th International Conference on Risks and Security of Internet and Systems.
Elrakaiby, Y., Amrani, M., & Le Traon, Y. (2014). A Flexible MDE approach to Enforce Fine- grained Security Policies. Proceedings of the International Symposium on Engineering Secure Software and Systems.
Peer reviewed
In this paper, we present a policy-based approach for au- tomating the integration of security mechanisms into Java-based business applications. In particular, we introduce an expressive Domain Specific ...
Elrakaiby, Y., Amrani, M., & Le Traon, Y. (2014). Security@Runtime: A flexible MDE approach to enforce fine-grained security policies. Lecture Notes in Computer Science, 8364 LNCS, 19-34.
Peer reviewed
In this paper, we present a policy-based approach for automating the integration of security mechanisms into Java-based business applications. In particular, we introduce an expressive Domain Specific modeling ...
Hartmann, T., Fouquet, F., Nain, G., Morin, B., Klein, J., Barais, O., & Le Traon, Y. (2014). A Native Versioning Concept to Support Historized Models at Runtime. In J., Dingel, W., Schulte, I., Ramos, S., Abrahao, & E., Insfran (Eds.), Model-Driven Engineering Languages and Systems - 17th International Conference, MODELS 2014, Valencia, Spain, September 28 - October 3, 2014. Proceedings (1st, pp. 252-268). Springer.
Peer reviewed
Models@run.time provides semantically rich reflection layers enabling intelligent systems to reason about themselves and their surrounding context. Most reasoning processes require not only to explore the ...
Henard, C., Papadakis, M., & Le Traon, Y. (2014). MutaLog: a Tool for Mutating Logic Formulas. Testing Tools Track, 7th International Conference on Software Testing, Verification and Validation (ICST 2014).
Peer reviewed
Henard, C., Papadakis, M., & Le Traon, Y. (2014). Mutation-based Generation of Software Product Line Test Configurations. Symposium on Search-Based Software Engineering (SSBSE 2014). Springer.
Peer reviewed
Lucas Filho, E. R., Cunha De Almeida, E., & Le Traon, Y. (2014). Intra-query Adaptivity for MapReduce Query Processing Systems. IDEAS 2014 : 18th International Database Engineering Applications Symposium. Porto, Portugal.
Peer reviewed
Martinez, J., Ziadi, T., Klein, J., & Le Traon, Y. (2014). BUT4Reuse Feature identifier: Identifying reusable features on software variants. Poster session presented at 3ème Conférence en IngénieriE du Logiciel.
Peer reviewed
Martinez, J., Ziadi, T., Klein, J., & Le Traon, Y. (2014). Identifying and Visualising Commonality and Variability in Model Variants. ECMFA 2014 European Conference on Modelling Foundations and Applications.
Peer reviewed
Martinez, J., Ziadi, T., Mazo, R., Klein, J., & Le Traon, Y. (2014). Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines. 2nd IEEE Working Conference on Software Visualization.
Peer reviewed
Meira, J. A., Almeida, E., & Le Traon, Y. (2014). A state machine for database non-functional testing. Poster session presented at 18th International Database Engineering & Applications Symposium.
Peer reviewed
Over the last decade, large amounts of concurrent transactions have been generated from different sources, such as, Internet-based systems, mobile applications, smart- homes and cars. High-throughput ...
Papadakis, M., Henard, C., & Le Traon, Y. (2014). Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing. 7th International Conference on Software Testing, Verification and Validation (ICST 2014).
Peer reviewed
Papadakis, M., & Le Traon, Y. (2014). Effective Fault Localization via Mutation Analysis: A Selective Mutation Approach. ACM Symposium On Applied Computing (SAC'14).
Peer reviewed
Rubab, I., Ali, S., Briand, L., & Le Traon, Y. (2014). Model-Based Testing of Obligations. 14th Annual International Conference on Quality Software (QSIC) (pp. 1-10). Los Alamitos: Ieee Computer Soc.
Peer reviewed
Obligations are mandatory actions that users must perform, addressing access control requirements. To ensure that such obligations are implemented correctly, an automated and systematic testing approach is ...
Ziadi, T., Henard, C., Papadakis, M., Ziane, M., & Le Traon, Y. (2014). Towards a Language-Independent Approach for Reverse-Engineering of Software Product Lines. 29th Symposium on Applied Computing (SAC 2014).
Peer reviewed
Caire, P., Bikakis, A., & Le Traon, Y. (2013). Information Dependencies in MCS: Conviviality-Based Model and Metrics. 16th INTERNATIONAL CONFERENCE ON PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS (PRIMA 2013).
Peer reviewed
Nguyen, P. H., Klein, J., Kramer, M., & Le Traon, Y. (2013). A Systematic Review of Model-Driven Security. The 20th Asia-Pacific Software Engineering Conference Proceedings.
Peer reviewed
To face continuously growing security threats and requirements, sound methodologies for constructing secure systems are required. In this context, Model-Driven Security (MDS) has emerged since more than a ...
Bissyande, T. F. D. A., Lo, D., Jiang, L., Reveillere, L., Klein, J., & Le Traon, Y. (2013). Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub. Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013).
Peer reviewed
Moawad, A., Bikakis, A., Caire, P., Nain, G., & Le Traon, Y. (2013). A Rule-based Contextual Reasoning Platform for Ambient Intelligence environments. Theory, Practice, and Applications of Rules on the Web (pp. 158-172). springer.
Peer reviewed
The special characteristics and requirements of intelligent environments impose several challenges to the reasoning processes of Ambient Intelligence systems. Such systems must enable heterogeneous entities ...
Moawad, A., Bikakis, A., Caire, P., Nain, G., & Le Traon, Y. (2013). R-CoRe: A Rule-based Contextual Reasoning Platform for AmI. Joint Proceedings of the 7th International Rule Challenge, the Special Track on Human Language Technology and the 3rd RuleML Doctoral Consortium hosted at the 8th International Symposium on Rules (RuleML2013).
Peer reviewed
In this paper we present R-CoRe; a rule-based contextual reasoning platform for Ambient Intelligence environments. R-CoRe integrates Contextual Defeasible Logic (CDL) and Kevoree, a component-based software ...
Nguyen, P. H., Nain, G., Klein, J., Mouelhi, T., & Le Traon, Y. (2013). Model-Driven Adaptive Delegation. In H., Masuhara, S., Chiba, & N., Ubayashi (Eds.), Proceedings of the 12th annual international conference companion on Aspect-oriented software development. New York, USA: ACM.
Peer reviewed
Model-Driven Security is a specialization of Model-Driven Engineering (MDE) that focuses on making security models productive, i.e., enforceable in the final deployment. Among the variety of models that have ...
Nguyen, P. H., Papadakis, M., & Rubab, I. (2013). Testing Delegation Policy Enforcement via Mutation Analysis. 7th International Workshop on Mutation Analysis (pp. 34-42). IEEE.
Peer reviewed
Delegation is an important dimension of security that plays a crucial role in the administration mechanism of access control policies. Delegation may be viewed as an exception made to an access control policy ...
Bissyande, T. F. D. A., Ahmat, D., Ouoba, J., van Stam, G., Klein, J., & Le Traon, Y. (2013). Sustainable ICT4D in Africa: Where Do We Go From Here? EAI International Conference on e-Infrastructure and e-Services for Developing Countries. Blantyre, Malawi.
Peer reviewed
In recent years many researchers in Africa and beyond have devoted considerable resources investigating ways to harness the potential of ICT for improving users’ livelihood in developing areas. Topics and ...
El Kateb, D., ElRakaiby, Y., Mouelhi, T., & Le Traon, Y. (2013). Access Control Enforcement Testing. Abstract book of 2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST), 64-70.
Peer reviewed
A policy-based access control architecture comprises Policy Enforcement Points (PEPs), which are modules that intercept subjects access requests and enforce the access decision reached by a Policy Decision ...
Elrakaiby, Y., & Le Traon, Y. (2013). A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications. 2013 International Conference on Availability, Reliability and Security.
Peer reviewed
Security of Java-based applications is crucial to many businesses today. In this paper, we propose an approach to completely automate the generation of a security architecture inside of a target Java ...
Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing. 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013. IEEE.
Peer reviewed
Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Multi-objective test generation for software product lines. 17th International Software Product Line Conference, SPLC 2013, Tokyo, Japan - August 26 - 30, 2013. ACM.
Peer reviewed
Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). PLEDGE: a product line editor and test generation tool. 17th International Software Product Line Conference co-located workshops, SPLC 2013 workshops, Tokyo, Japan - August 26. ACM.
Peer reviewed
Henard, C., Papadakis, M., Perrouin, G., Klein, J., & Le Traon, Y. (2013). Towards automated testing and fixing of re-engineered feature models. Proceedings of the 2013 International Conference on Software Engineering. Piscataway, NJ, USA: IEEE Press.
Peer reviewed
Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., & Le Traon, Y. (2013). Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. Effective Inter-Component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis.
Peer reviewed
Many threats present in smartphones are the result of interactions between application components, not just artifacts of single components. However, current techniques for identifying inter-application ...
Papadakis, M., Delamaro, E. M., & Le Traon, Y. (2013). Proteum/FL: A tool for localizing faults using mutation analysis. International Working Conference on Source Code Analysis and Manipulation (pp. 94-99).
Peer reviewed
Papadakis, M., & Le Traon, Y. (2013). Mutation Testing Strategies using Mutant Classification. Abstract book of 28th Symposium On Applied Computing.
Peer reviewed
Hwang, J., Xie, T., El Kateb, D., Mouelhi, T., & Le Traon, Y. (2012, September). Selection of Regression System Tests for Security Policy Evolution. Paper presented at 27th IEEE/ACM International Conference Automated Software Engineering 2012.
Peer reviewed
Bikakis, A., Efthymiou, V., Caire, P., & Le Traon, Y. (2012). Introducing Conviviality as a property of Multi-Context Systems. The 4th International Workshop on Acquisition, Representation and Reasoning with Contextualized Knowledge ARCOE-12.
Peer reviewed
Moawad, A., Efthymiou, V., Caire, P., Nain, G., & Le Traon, Y. (2012). Introducing Conviviality as a New Paradigm for Interactions among IT Objects. Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments, 907, 3-8.
Peer reviewed
The Internet of Things allows people and objects to seamlessly interact, crossing the bridge between real and virtual worlds. Newly created spaces are heterogeneous; social relations naturally extend to smart ...
Perrouin, G., Morin, B., Chauvel, F., Fleurey, F., Klein, J., Le Traon, Y., Barais, O., & Jézéquel, J.-M. (2012). Towards Flexible Evolution of Dynamically Adaptive Systems. New Ideas & Emerging Results Track of the International Conference of Software Engineering (NIER@ICSE) (pp. 1353-1356). IEEE Press.
Peer reviewed
Modern software systems need to be continuously available under varying conditions. Their ability adapt to their execution context is thus increasingly seen as a key to their success. Recently, many approaches ...
El Kateb, D., Elrakaiby, Y., Mouelhi, T., & Le Traon, Y. (2012). Access Control Enforcement Testing. 8th International Workshop on Automation of Software Test (AST), 2013 (pp. 64-70).
Peer reviewed
A policy-based access control architecture com- prises Policy Enforcement Points (PEPs), which are modules that intercept subjects access requests and enforce the access decision reached by a Policy Decision ...
El Kateb, D., Mouelhi, T., Le Traon, Y., Hwang, J., & Xie, T. (2012). Refactoring access control policies for performance improvement. Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (pp. 323--334). New York, NY, USA: ACM.
Peer reviewed
Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2012). Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android. IEEE/ACM International Conference on Automated Software Engineering (pp. 1-4).
Peer reviewed
In the permission-based security model (used e.g. in An- droid and Blackberry), applications can be granted more permissions than they actually need, what we call a permission gap?. Malware can leverage ...
Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2012). Dexpler: Converting Android Dalvik Bytecode to Jimple for Static Analysis with Soot. ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2012) (pp. 1-12). Beijing, China.
Peer reviewed
This paper introduces Dexpler, a software package which converts Dalvik bytecode to Jimple. Dexpler is built on top of Dedexer and Soot. As Jimple is Soot’s main internal rep- resentation of code, the Dalvik ...
El Rakaiby, Y., Mouelhi, T., & Le Traon, Y. (2012). Testing Obligation Policy Enforcement using Mutation Analysis. Proceedings of the 7th International Workshop on Mutation Analysis (associated to the Fifth International Conference on Software Testing, Verification, and Validation, ICST 2012), 100-110.
Peer reviewed
The support of obligations with access control policies allows the expression of more sophisticated requirements such as usage control, availability and privacy. In order to enable the use of these policies ...
Elkateb, D., Mouelhi, T., Le Traon, Y., Hwang, J., & Xie, T. (2012). Refactoring Access Control Policies for Performance Improvement. Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (ICPE 2012), 100-110.
Peer reviewed
In order to facilitate managing authorization, access control architectures are designed to separate the business logic from an access control policy. To determine whether a user can access which resources, a ...
Elrakaiby, Y., Mouelhi, T., & Le Traon, Y. (2012). Testing obligation policy enforcement using mutation analysis. Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012, 673-680.
Peer reviewed
The support of obligations with access control policies allows the expression of more sophisticated requirements such as usage control, availability and privacy. In order to enable the use of these policies ...
Kintis, M., Papadakis, M., & Malevris, N. (2012). Isolating First Order Equivalent Mutants via Second Order Mutation. ICST 2012 (pp. 701-710).
Peer reviewed
Meira, J. A., Almeida, E. C., Le Traon, Y., & Sunye, G. (2012). Peer-to-Peer Load Testing. Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on (pp. 642-647). IEEE.
Peer reviewed
Nowadays the large-scale systems are common-place in any kind of applications. The popularity of the web created a new environment in which the applications need to be highly scalable due to the data tsunami ...
Papadakis, M., & Le Traon, Y. (2012). Using Mutants to Locate "Unknown" Faults. ICST 2012.
Peer reviewed
Xu, D., Thomas, L., Kent, M., Mouelhi, T., & Le Traon, Y. (2012). A Model-Based Approach to Automated Testing of Access Control Policies. Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 100-110.
Peer reviewed
Access control policies in software systems can be implemented incorrectly for various reasons. This paper presents a model-based approach for automated testing of access control implementation. To feed the ...
Bartel, A., Baudry, B., Munoz, F., Klein, J., Mouelhi, T., & Le Traon, Y. (2011). Model Driven Mutation Applied to Adaptative Systems Testing. Mutation 2011 (@ICST).
Peer reviewed
Dynamically Adaptive Systems modify their behavior and structure in response to changes in their surrounding environment and according to an adaptation logic. Critical systems increasingly incorporate dynamic ...
Perrouin, G., Sen, S., Klein, J., Baudry, B., & Le Traon, Y. (2010). Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines. International Conference on Software Test and Validation.
Peer reviewed